Skip to main content

💼 CIS AWS v3.0.0

  • Contextual name: 💼 CIS AWS v3.0.0
  • ID: /frameworks/cis-aws-v3.0.0

Description

Empty...

Similar

  • Internal
    • ID: dec-a-84ac6eda

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags
💼 1 Identity and Access Management22
    💼 1.1 Maintain current contact details - Level 1 (Manual)1
    💼 1.2 Ensure security contact information is registered - Level 1 (Manual)1
    💼 1.3 Ensure security questions are registered in the AWS account - Level 1 (Manual)
    💼 1.4 Ensure no 'root' user account access key exists - Level 1 (Automated)11
    💼 1.5 Ensure MFA is enabled for the 'root' user account - Level 1 (Automated)1
    💼 1.6 Ensure hardware MFA is enabled for the 'root' user account - Level 2 (Manual)1
    💼 1.7 Eliminate use of the 'root' user for administrative and daily tasks - Level 1 (Manual)11
    💼 1.8 Ensure IAM password policy requires minimum length of 14 or greater - Level 1 (Automated)1
    💼 1.9 Ensure IAM password policy prevents password reuse - Level 1 (Automated)11
    💼 1.10 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password - Level 1 (Automated)1
    💼 1.11 Do not setup access keys during initial user setup for all IAM users that have a console password - Level 1 (Manual)11
    💼 1.12 Ensure credentials unused for 45 days or greater are disabled - Level 1 (Automated)1
    💼 1.13 Ensure there is only one active access key available for any single IAM user - Level 1 (Automated)11
    💼 1.14 Ensure access keys are rotated every 90 days or less - Level 1 (Automated)11
    💼 1.15 Ensure IAM Users Receive Permissions Only Through Groups - Level 1 (Automated)11
    💼 1.16 Ensure IAM policies that allow full ":" administrative privileges are not attached - Level 1 (Automated)1
    💼 1.17 Ensure a support role has been created to manage incidents with AWS Support - Level 1 (Automated)1
    💼 1.18 Ensure IAM instance roles are used for AWS resource access from instances - Level 2 (Automated)11
    💼 1.19 Ensure that all the expired SSL/TLS certificates stored in AWS IAM are removed - Level 1 (Automated)11
    💼 1.20 Ensure that IAM Access analyzer is enabled for all regions - Level 1 (Automated)11
    💼 1.21 Ensure IAM users are managed centrally via identity federation or AWS Organizations for multi-account environments - Level 2 (Manual)1
    💼 1.22 Ensure access to AWSCloudShellFullAccess is restricted - Level 1 (Manual)1
💼 2 Storage4
    💼 2.1 Simple Storage Service (S3)4
        💼 2.1.1 Ensure S3 Bucket Policy is set to deny HTTP requests - Level 2 (Automated)11
        💼 2.1.2 Ensure MFA Delete is enabled on S3 buckets - Level 2 (Manual)11
        💼 2.1.3 Ensure all data in Amazon S3 has been discovered, classified and secured when required - Level 2 (Manual)1
        💼 2.1.4 Ensure that S3 Buckets are configured with 'Block public access (bucket settings)' - Level 1 (Automated)11
    💼 2.2 Elastic Compute Cloud (EC2)1
        💼 2.2.1 Ensure EBS Volume Encryption is Enabled in all Regions - Level 1 (Automated)11
    💼 2.3 Relational Database Service (RDS)3
        💼 2.3.1 Ensure that encryption-at-rest is enabled for RDS Instances - Level 1 (Automated)11
        💼 2.3.2 Ensure Auto Minor Version Upgrade feature is Enabled for RDS Instances - Level 1 (Automated)11
        💼 2.3.3 Ensure that public access is not given to RDS Instance - Level 1 (Automated)11
    💼 2.4 Elastic File System (EFS)1
        💼 2.4.1 Ensure that encryption is enabled for EFS file systems - Level 1 (Automated)11
💼 3 Logging9
    💼 3.1 Ensure CloudTrail is enabled in all regions - Level 1 (Automated)1
    💼 3.2 Ensure CloudTrail log file validation is enabled - Level 2 (Automated)11
    💼 3.3 Ensure AWS Config is enabled in all regions - Level 2 (Automated)1
    💼 3.4 Ensure S3 bucket access logging is enabled on the CloudTrail S3 bucket - Level 1 (Automated)1
    💼 3.5 Ensure CloudTrail logs are encrypted at rest using KMS CMKs - Level 2 (Automated)1
    💼 3.6 Ensure rotation for customer-created symmetric CMKs is enabled - Level 2 (Automated)11
    💼 3.7 Ensure VPC flow logging is enabled in all VPCs - Level 2 (Automated)11
    💼 3.8 Ensure that Object-level logging for write events is enabled for S3 bucket - Level 2 (Automated)1
    💼 3.9 Ensure that Object-level logging for read events is enabled for S3 bucket - Level 2 (Automated)1
💼 4 Monitoring16
    💼 4.1 Ensure unauthorized API calls are monitored - Level 2 (Manual)1
    💼 4.2 Ensure management console sign-in without MFA is monitored - Level 1 (Manual)1
    💼 4.3 Ensure usage of 'root' account is monitored - Level 1 (Manual)1
    💼 4.4 Ensure IAM policy changes are monitored - Level 1 (Manual)1
    💼 4.5 Ensure CloudTrail configuration changes are monitored - Level 1 (Manual)1
    💼 4.6 Ensure AWS Management Console authentication failures are monitored - Level 2 (Manual)1
    💼 4.7 Ensure disabling or scheduled deletion of customer created CMKs is monitored - Level 2 (Manual)1
    💼 4.8 Ensure S3 bucket policy changes are monitored - Level 1 (Manual)1
    💼 4.9 Ensure AWS Config configuration changes are monitored - Level 2 (Manual)1
    💼 4.10 Ensure security group changes are monitored - Level 2 (Manual)1
    💼 4.11 Ensure Network Access Control Lists (NACL) changes are monitored - Level 2 (Manual)1
    💼 4.12 Ensure changes to network gateways are monitored - Level 1 (Manual)1
    💼 4.13 Ensure route table changes are monitored - Level 1 (Manual)1
    💼 4.14 Ensure VPC changes are monitored - Level 1 (Manual)1
    💼 4.15 Ensure AWS Organizations changes are monitored - Level 1 (Manual)1
    💼 4.16 Ensure AWS Security Hub is enabled - Level 2 (Automated)11
💼 5 Networking6
    💼 5.1 Ensure no Network ACLs allow ingress from 0.0.0.0/0 to remote server administration ports - Level 1 (Automated)1
    💼 5.2 Ensure no security groups allow ingress from 0.0.0.0/0 to remote server administration ports - Level 1 (Automated)11
    💼 5.3 Ensure no security groups allow ingress from ::/0 to remote server administration ports - Level 1 (Automated)11
    💼 5.4 Ensure the default security group of every VPC restricts all traffic - Level 2 (Automated)1
    💼 5.5 Ensure routing tables for VPC peering are "least access" - Level 2 (Manual)1
    💼 5.6 Ensure that EC2 Metadata Service only allows IMDSv2 - Level 1 (Automated)11